- Level Foundation
- المدة 22 ساعات hours
- الطبع بواسطة University of London
-
Offered by
عن
This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes examining the types of threat that cyber security must address, as well as the range of mechanisms, both technological and procedural, that can be deployed. The role of cryptography in providing security is explored, including how algorithms and keys play their part in enabling cyber security. The key supporting function played by key management is identified, including why the use of cryptographic functions depends on it. The need for security management in an organisation is explained, and its main elements are introduced - including the key role played by risk management. The importance of standardised approaches to security management is explained, as is the notion of compliance.الوحدات
Course overview
1
Assignment
- Getting the ideas right
1
Discussions
- What do you want from this course?
2
Videos
- Getting started
- Understanding security from experience
1
Readings
- Key ideas in the literature
What is cyber security?
1
Assignment
- Definitions
2
Videos
- Goals of security
- Addressing threats
2
Readings
- Laying the foundations
- Other ways of defining cyber security
A formal definition: The CIA triad
2
Assignment
- Review of concepts
- CIA – a basis for building security
2
Videos
- What is CIA?
- Using CIA to build security
2
Readings
- Other approaches
- Applying CIA to an organisation
The scope of cyber security
1
Assignment
- Module 1 test
1
Discussions
- Dividing it up
1
Videos
- Security for data in motion and at rest
1
Readings
- Types of security
Why cryptography?
1
Assignment
- What is cryptography?
2
Videos
- A brief history
- The role of keys
1
Readings
- The need for cryptography
The cryptographic toolkit
1
Assignment
- What can cryptography do?
2
Videos
- Guaranteeing integrity and authenticity
- What encryption can and can't do
1
Readings
- The scope of cryptography
Algorithms and keys
2
Assignment
- Common algorithms
- Public, private and secret keys
2
Videos
- What is an algorithm?
- Managing keys
2
Readings
- Algorithms and cryptanalysis
- PKI and key distrubution
Using cryptography
1
Assignment
- Module 2 test
1
Discussions
- What can I do?
2
Videos
- Where does cryptography fit?
- Common pitfalls
1
Readings
- Systems and protocols
Security management – the basics
1
Assignment
- Exploring key concepts
2
Videos
- What is security management
- Security policies and controls
1
Readings
- Elements of security management
Managing risk
1
Assignment
- Understanding risk
1
Discussions
- What are cyber security risks?
1
Videos
- Risk assessment and risk management
1
Readings
- Approaches to managing risk
ISO/IEC 27001 and the ISMS
2
Assignment
- Building an effective ISMS
- The range of approaches
2
Videos
- The ISMS
- Other approaches
2
Readings
- Using ISO/IEC 27001
- Cyber Essentials and the NIST standards
Incident management
1
Assignment
- Module 3 test
1
Discussions
- Designing effective incident response
1
Videos
- Responding to a security breach
2
Readings
- Incident response management
- Forms and procedures
Auto Summary
Unlock the essentials of cyber security with the Cyber Security Fundamentals course, designed for anyone with a solid understanding of information and communications technology. Dive into the critical concepts of cyber security, from understanding the nature and scope of cyber threats to exploring technological and procedural defense mechanisms. Led by expert instructors on Coursera, this foundational course covers the pivotal role of cryptography, including the importance of algorithms, keys, and key management in safeguarding information. You'll gain insights into the necessity of security management within organizations and learn about the core elements of risk management and compliance with standardized security approaches. Spanning an in-depth 1320 minutes of content, the course offers flexible subscription options, including Starter and Professional tiers, making it accessible for both newcomers and those seeking to solidify their foundational knowledge in IT and Computer Science. Whether you're beginning your journey in cyber security or strengthening your existing skills, this course provides the knowledge and tools to excel in safeguarding digital information.

Chris Mitchell